Documente Academic
Documente Profesional
Documente Cultură
criminal network:
How it worked
2
RECRUITING ACCOMPLICES
3
COVERING THEIR TRACKS
4
DISTRIBUTION AND INFECTION
5
BULLETPROOF HOSTING
After GozNym
Once infected, sensitive information from victims’ stole victims’
computers was passed to the GozNym conspirators online banking
through a complex layer of servers designed to prevent information, it was
detection by law enforcement and cybersecurity experts. sent to a central
access panel.
6
TAKING CONTROL OF ACCOUNTS
7
CASHING OUT
Russia
Poltava
Moscow
Orenburg
Khmelnytskyi Ukraine
Volograd Kazakhstan
Balti Moldova Stavropol
Bulgaria Georgia
Nikolaev
Varna Tbilisi
COOPERATION BETWEEN
United States